• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
access control:
The mechanism used in an information system to allow or restrict access to data or devices.
access control list (ACL):
A set of permissions that are attached to an object.
access control model:
A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Access control list (ACL):
A set of permissions that are attached to an object.
account expiration:
The process of setting a users account to expire.
Discretionary Access Control (DAC):
The least restrictive access control model in which the owner of the object has total control over it.
Extended TACAS:
The second version of the Terminal Access Control Access Control System (TACAS) authentication service.
implicit deny:
Rejecting access unless a condition is explicitly met.
job rotation:
The act of moving individuals from one job responsibility to another.
Kerberos:
An authentication system developed by the MIT and used to verify the identity of networked used.
least privilege:
Providing only the minimum amount of privileges necessary to perform a job or function.
LDAP injection attack:
An attack that constructs LDAP statements based on user input statements, allowing the attacker to retrieve information from the LDAP database or modify its content.
Lightweight Directory Access Protocol (LDAP):
A protocol for a client application to access an X.500 directory
Mandatory Access Control (MAC):
The most restrictive access control model typically found in military settings in which security is of supreme importance.
mandatory vacations:
Requiring that all employees take vacations.
Remote authentication Dial in User Service(RADIUS):
An industry standard authentication service with widespread support across nearly all vendors of networking equipment.
Role Based Access Control (RBAC):
A real world access control model in which access is based on a users job function within the organization.
Rule Based Access Control(RBAC):
An access control model that can dynamically assign roles to subjects based on a set of rules defined by a custodian.
separation of duties:
The practice of requiring that processes should be dived between two or more individuals.
TACAS+
The current version of the Terminal Access Control Access Control System (TACAS) authentication service.
Terminal Access Control Access Control System(TACAS):
An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server. The current version is TACAS+
time of day restrictions:
Limitations imposed as to when a user can log on to a system.